howdy
play

HOWDY! DSA IT Liaisons Communications Committee 11/03/2020 Agenda - PowerPoint PPT Presentation

HOWDY! DSA IT Liaisons Communications Committee 11/03/2020 Agenda Tech Tip: Siteimprove Intelligence Platform Annual Security Assessment Update Data Protection Efforts and Best Practices Mac Management Initiative


  1. HOWDY! DSA IT Liaisons Communications Committee 11/03/2020

  2. Agenda • Tech Tip: Siteimprove Intelligence Platform • Annual Security Assessment Update • Data Protection Efforts and Best Practices Mac Management Initiative • • DoIT Updates • Q&A

  3. Donald St. Martin

  4. Siteimprove Modules

  5. Automated accessibility checks ▶ Siteimprove provides automated testing that strictly adheres to WCAG standards, so you can spot issues and errors across all conformance levels. Automated testing allows you to simultaneously audit hundreds of thousands of pages across dozens of sites, so you can prioritize the parts of your website that need swift attention. Siteimprove also runs automated accessibility tests on your PDFs to ensure they are accessible and user-friendly.

  6. Link and spell check ▶ Find out exactly where dead-ends and mistakes live on your website and fix them before visitors notice. Be certain no broken link or ● misspelling falls through the cracks Prioritize what to fix first based on ● page views and click data Create a custom, brand-specific ● dictionary to speed up spell checks

  7. On-page diagnostics ▶ Siteimprove SEO incorporates 66 unique SEO checks, including scans for missing meta descriptions, spelling mistakes, broken links, outdated files, poor readability, and links to unsafe domains. How you perform against these checks make up your SEO Score, measured on a scale of 0-100.

  8. Annual IT Security Risk Assessment Update Justin Ellison Russell Gatlin

  9. IT Security Risk Assessment Update

  10. Data Protection Efforts and Best Practices Justin Ellison Russell Gatlin

  11. Data Protection Efforts and Best Practices SC-13 (Cryptographic Protection) lays out encryption requirements for protecting confidential and restricted information Confidential and restricted information must be protected with appropriate ● encryption at all times, both at rest and in transit. Confidential and restricted information must be encrypted if copied to, or ● stored on, a portable computing device, or removable media Controlled information that is transmitted over a public network (e.g., the ● Internet) must be encrypted The owner of an information resource, or designee, is responsible for implementing this control.

  12. Data Protection Efforts (cont’d) DoIT Efforts Windows 10 Disk Encryption - Database Transparent Data Encryption - Virtual Server Encryption - In Testing: Symantec File Share Encryption - Best Practices FileX for transferring Confidential/Restricted Data - Outlook option for sending encrypted email (discussed previously) - Scanning docs to connected devices (networked multifunction devices) -

  13. Data Protection Efforts - Copiers Copiers have local • storage Scanned document • images are saved locally Some copiers are • configured to send to Email and/or Network File Shares Copier storage and • transmission not encrypted

  14. Mac Management Initiative Morgan Hammond

  15. Mac Management Initiative

  16. DoIT Updates ● BRM and IT Comm/Training Coordinator – Liaisons attend 2nd round BRM interviews (wk of 11/16) ● Systems Administrator II ● Tentative Teams Training scheduled for 11/12 ● Draft Demand Reviews with Liaisons coming...

  17. Department Q&A Darvis Griffin

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend